Name | CVE-2006-0707 |
Description | PyBlosxom before 1.3.2, when running on certain webservers, allows remote attackers to read arbitrary files via an HTTP request with multiple leading / (slash) characters, which is accessed using the PATH_INFO variable. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
pyblosxom | source | sarge | (not affected) | |||
pyblosxom | source | (unstable) | 1.3.2-1 | high |
[sarge] - pyblosxom <not-affected> (Vulnerable path handling code not present)